www.threathq.com
Open in
urlscan Pro
54.187.42.249
Public Scan
Effective URL: https://www.threathq.com/account/login
Submission: On October 23 via manual from US
Summary
TLS certificate: Issued by Amazon on August 12th 2020. Valid for: a year.
This is the only time www.threathq.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 10 | 54.187.42.249 54.187.42.249 | 16509 (AMAZON-02) (AMAZON-02) | |
9 | 1 |
ASN16509 (AMAZON-02, US)
PTR: ec2-54-187-42-249.us-west-2.compute.amazonaws.com
www.threathq.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
threathq.com
1 redirects
www.threathq.com |
301 KB |
9 | 1 |
Domain | Requested by | |
---|---|---|
10 | www.threathq.com |
1 redirects
www.threathq.com
|
9 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
threathq.com Amazon |
2020-08-12 - 2021-09-11 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.threathq.com/account/login
Frame ID: 7E0BC5185C3B0219720A6D6C29A7DAF3
Requests: 9 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://www.threathq.com/p42/search/default?m=56511
HTTP 302
https://www.threathq.com/account/login Page URL
Detected technologies
CentOS (Operating Systems) ExpandDetected patterns
- headers server /CentOS/i
OpenSSL (Web Server Extensions) Expand
Detected patterns
- headers server /OpenSSL(?:\/([\d.]+[a-z]?))?/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery[.-]([\d.]*\d)[^/]*\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://www.threathq.com/p42/search/default?m=56511
HTTP 302
https://www.threathq.com/account/login Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
login
www.threathq.com/account/ Redirect Chain
|
4 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-1.11.1.min.js
www.threathq.com/resources/jquery/ |
94 KB 94 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
select2.css
www.threathq.com/resources/jquery.3rdparty/form/select2/ |
17 KB 17 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
p42.css
www.threathq.com/resources/css/ |
145 KB 146 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
static.js
www.threathq.com/resources/app/ |
364 B 584 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cf_logo.png
www.threathq.com/resources/images/ |
12 KB 12 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fp-envelope.png
www.threathq.com/resources/images/icons/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fp-password.png
www.threathq.com/resources/images/icons/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
opensans-normal.woff
www.threathq.com/resources/fonts/ |
20 KB 20 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
8 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes function| $ function| jQuery object| ERRORS object| jQuery11110152832059332735911 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.threathq.com/ | Name: P42SESSID Value: F72860E7887FC769A710CD85D58350DD |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000 ; includeSubDomains |
X-Content-Type-Options | nosniff |
X-Frame-Options | DENY |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.threathq.com
54.187.42.249
09482846d4679d6e57e7aa3813d8e815fccff3f7c8ec7445de9881160f4cdea5
363dbec49c3a8b0c6e710c795fa8deff012a39fd2ea9bdbe91b4522f0ee30266
540bc6dec1dd4b92ea4d3fb903f69eabf6d919afd48f4e312b163c28cff0f441
70995a2cc0b7e79d85f0adc9ef570d047b46cf5596737262917c73fcb662fb89
77f718cc27297141451db878a84c5da48486a48debd2aa3ab966eb6f08de709a
84694731eda63be992ae779bc5e8e3bbe78957738868686bb2f73774dcaa6f42
c1be44e53d9a561c240b5f975bafdfab8e3fef5221fb2fc1ea437e0d2f61af71
df7de1f609f36bc4f0b8c56c23ffd2dfaa78f3341e479b0a3a8a4c802f6acc80
f68d95dc7f3eb2342bcd8f57d2673fa658aff6689b0f2d82fda132bc41fb239b